UNCLASSIFIED Approved for Public Release Cyber and Electronic Warfare Division DST Partnerships Week 2016 Science and technology to understand and counter the threat using electronic means 1
Cyber & Electronic Warfare Division Mission: To understand and mitigate threats using electronic means Major S&T Capabilities Program • Strategic Research programs in both Cyber and Future EW, plus others under development), within the DST Strategic Research Initiatives program • Support for the Defence IIP (Integrated Investment Program, formerly DCP) in transitioning technology • The Cyber-EW Continuum is the convergence of developments to capability cyber, SIGINT, communications and EW. • CEWD leverages our internal capability via strong • In accordance with national priorities outlined in international partnerships, including TTCP and the Next Generation Technologies (White paper), bilateral agreements with other nations the Cyber Security Strategy, and increasing • CEWD has an extensive history of collaboration requirements from the ADF for cyber S&T, CEWD with academia and Defence industry, and creates develops and applies technologies across the opportunities for future collaborative cyber-EW continuum to address threats in a data- developments driven, networked, cyber-physical future Partnership examples Opportunities to partner with CEWD • • Data 61/CSIRO – trustworthy cyber (software) Hinder – Autonomous cyber defence • UNI NSW – trustworthy cyber (hardware) • SCADS - Self-organising Communications and • Northrupp Grumman – Digital Video Guard (DVG) and EO Distributed Aperture System Autonomous Delivery Service (EODAS) UAV-based resilient communications • • Ultra Avalon – RF sensing and analysis EODAS – Electro-optic Distributed Aperture S&T highlights System • Digital Video Guard (DVG) A irborne platform 360 degree threat sensing • Wideband Global SATCOM Anchoring Monitoring System • Redwing Program • LIVE Maritime Situational Awareness • DIRCM world leading laser research
Cyber and Electronic Warfare Division Structure Jackie Craig Phil Stimson Alasdair McInnes Anthony Schellhase Colin Coleman Mike Davies Gareth Parker EO RF Technologies Automated Access Active Security Protected Satellite Countermeasures Analytics & Technologies Technologies Communications Decision Support Protocol Exploitation RF Cyber Defence Communication Distributed EW RF Systems Electronic Attack Analytics Networks Experimentation Research & Simulation Survivable Networks Communications PNT RF Techniques & Laser Cyber & Crypto- Signal Technologies & Exploitation Technologies mathematics Research Processing Systems Communications EW
UNCLASSIFIED Approved for Public Release Cyber Assurance and Operations MSTC To enable autonomous, resilient and effective cyber capabilities with an operational edge Dr Mike Davies Research Leader michael.davies@dsto.defence.gov.au 4
Cyber and Electronic Warfare Division Structure Jackie Craig Phil Stimson Alasdair McInnes Anthony Schellhase Colin Coleman Mike Davies Gareth Parker Active Security Technologies Cyber Defence Analytics Cyber & Crypto- mathematics Research
Introduction Cyber Security Dilemma We develop new Defenders are But then, measures through losing (or at best however, so advancing our playing catch-up), do the threat concepts, tools attackers are actors! and techniques winning (or at least calling the shots) 6
A Challenge Threat How can we decrease the chance of just making Defence incremental improvements which get outpaced? Defence Threat And increase the chance of producing a sustainable game- changer? What qualities do we need from the Australian R&D community?... 7
Modus Operandi in DST Group Cyber Assurance and Operations S&T We focus above mainstream We forecast and prototype We develop techniques to discover advanced forms of adversarial and counter their presence software and hardware. We demonstrate their likely appearance and effect We develop and use advanced cryptologic We develop tools and techniques techniques to discover vulnerabilities and fix and repeat predispositions We develop solutions BEFORE this!! for resilient and trustworthy ICT We demonstrate robust risk- We have impact based pervasive security We pursue autonomous and raise the bar… policy and architectures cyber defence solutions 8
DST Cyber Assurance and Operations Branch A critical enabler of effective cyber operations and resilient trustworthy systems
10
UNCLASSIFIED Approved for Public Release Cyber Sensing and Shaping MSTC Sensing and shaping of communication networks for Cyber Dr Gareth Parker Research Leader gareth.parker@dsto.defence.gov.au 11
Cyber and Electronic Warfare Division Structure Jackie Craig Phil Stimson Alasdair McInnes Anthony Schellhase Colin Coleman Mike Davies Gareth Parker Access Technologies Communication Networks Research Communications Signal Processing
UNCLASSIFIED Cyber Sensing and Shaping MSTC “Sensing & shaping of communication networks for Cyber” Context S&T scope: Communication networks • Convergence of telecommunications and • Network characterisation & knowledge the internet representation • Ubiquitous connectivity, mobile devices • Network structures, protocols and behaviours and the IOT • Vulnerability discovery and treatment • Computers are connected via networks • Communications technologies Domain: Intelligence and Core knowledge and skills security • Telecommunications and internet architectures & protocols • Communications and information theory • Signal processing • Data sciences • Communications technologies – RF, digital systems, SDR, photonics 13
UNCLASSIFIED Access Technologies “Technologies for cyber access and tailored communications” Group Leader: Mr Jon Arnold Bespoke wireless communications • High data rate: mm-wave, FSOC • Low probability of detection waveforms RF & photonic technologies • Wearable and other specialised antennas and RF • Size, weight and power constrained technologies • Reconfigurable modem capabilities 14
UNCLASSIFIED Communications Signal Processing “Physical and cross-layer processing of wireless networks” Group Leader: Dr Jeff McCarthy Signals analysis • Signal collection, enhancement and geolocation Waveform security • MIMO, multichannel and diversity techniques Software defined radio solutions 15
UNCLASSIFIED Communication Networks Research “Telecommunications core networks and the internet” Group Leader: Dr Peter Dickinson Characterisation • Topology, traffic flow, and temporal aspects Network knowledge representation • Modelling and analysis of global multilayered communications networks Network vulnerabilities • Understanding how routing protocol vulnerabilities can be exploited by an adversary • Techniques and technologies for detection, protection and mitigation 16
UNCLASSIFIED Specific Areas for Collaboration 17
UNCLASSIFIED Body Worn Antennas and RF Current collaborations Aim • University of Adelaide (via PhD research of To develop new technologies for Deshan Govender) efficient antennas and RF that are • CSIRO – battery technology & conducting fabrics safe for body worn applications in Areas for expanded collaboration future tactical communications • Mobile power technologies • Flexible materials for RF and DC power distribution and antennas Contacts Our approach Mr Adrian Caldow • Fabric antennas Adrian.caldow@dsto.defence.gov.au • ‘Metamaterials’ (08) 7389 5861 • Printed structures 18
UNCLASSIFIED Wireless Security Aim Areas for expanded collaboration • Wireless network characterisation To explore vulnerabilities in • Cross-layer approaches wireless communications systems • Wireless sensor networks security and develop physical layer approaches to enhancing security Our approach Contacts • Physical layer – LPD, MIMO, Dr John Kitchen john.kitchen@dsto.defence.gov.au diversity (08) 7389 6431 19
UNCLASSIFIED Internet Traffic Profiling Aim Areas for expanded collaboration • • Categorise high rate traffic Data science for network analysis • Summarising bulk historical • Blind change and abnormality network data detection • Algorithm development for distributed processing Our approach Contacts • Characterisation of summarised Mr Darren Webb darren.webb@dsto.defence.gov.au data (i.e. NetFlow) (08) 7389 4132 • Statistical and machine learning techniques to mathematically enhanced protocol-based network knowledge 20
UNCLASSIFIED Routing Security Current collaboration Aim US Dept Homeland security Secure critical infrastructure by protecting the internet control plane Areas for expanded collaboration • Investigate the utility of route monitors to protect paths and network reachability. Our approach Contacts • Assess threats using emulated Mr Chris Wiren chris.wiren@dsto.defence.gov.au models of computer networks (08) 7389 6572 • Investigate effectiveness of emerging security measures 21
Recommend
More recommend